課程信息
In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware and perform source code analysis. you will be provided with a brief overview of DDoS Defense techniques. You learn an Autonomous Anti-DDoS Network called A2D2 for small/medium size organizations to deal with DDoS attacks. A2D2 uses Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types. You learn the new Intrusion tolerance paradigm with proxy-based multipath routing for DDoS defense. By developing and deploying such a new security mechanism, you can improve performance and reliability of the system at the same time and it does not have to be just an overhead. By the end of this course, you should be able to analyze new DDoS malware, collect forensic evidences, deploy firewall features to reduce the impact of DDoS on your system and develop strategies for dealing with future DDoS attacks. For the pre-requisites, we recommend the learners take the Design and Analyze Secure Networked Systems course to learn the basic security concepts and principles and take the Secure Networked System with Firewall and IDS courses to learn the basic firewall and IDS systems....
Globe

100% 在線課程

立即開始,按照自己的計劃學習。
Calendar

可靈活調整截止日期

根據您的日程表重置截止日期。
Beginner Level

初級

Clock

Approx. 11 hours to complete

建議:8 hours/week...
Comment Dots

English

字幕:English...
Globe

100% 在線課程

立即開始,按照自己的計劃學習。
Calendar

可靈活調整截止日期

根據您的日程表重置截止日期。
Beginner Level

初級

Clock

Approx. 11 hours to complete

建議:8 hours/week...
Comment Dots

English

字幕:English...

教學大綱 - 您將從這門課程中學到什麼

Week
1
Clock
完成時間為 4 小時

DDoS Attacks

In this MOOC, you will learn the history of DDoS attacks, get an in-depth look at the characteristics new Mirai IoT Malware attack. You will know how to analyze the Mirai source code and understand its design and implementation details. You will also see how forensic evidences pointed where it was designed. By the end of the course, you are able to take a new DDoS malware and perform detailed analysis and collect forensic evidences. ...
Reading
4 個視頻(共 30 分鐘), 4 個閱讀材料, 3 個測驗
Video4 個視頻
History of DDoS7分鐘
Mirai DDoS Attacks10分鐘
Mirai Source Code Analysis9分鐘
Reading4 個閱讀材料
DDoS Attack Cases30分鐘
History of DDoS: from digital civil disobedience to online censorship26分鐘
Breaking Down Mirai: An IoT DDoS Botnet Analysis40分鐘
Mirai Source Code Analysis10分鐘
Quiz3 個練習
Practice Quiz 2.1.2. Mirai DDoS Characteristics10分鐘
Practice Quiz 2.1.3 . Mirai Malware Analysis10分鐘
Quiz 2.1 History of DDoS Attacks30分鐘
Week
2
Clock
完成時間為 3 小時

DDoS Defenses

In this module, you will be provided a brief overview of Basic DDoS Defense techniques. By the end of this course, you should be able to deploy firewall features to reduce the impact of DDoS on your system and develop strategies for dealing with future DDoS attacks....
Reading
3 個視頻(共 21 分鐘), 3 個閱讀材料, 4 個測驗
Video3 個視頻
Major DDoS Defense Techniques6分鐘
Intrusion Response and Intrusion Tolerance6分鐘
Reading3 個閱讀材料
Technical overview of DDoS and mitigation techniques54分鐘
Survey of Major Techniques in DDoS Defense45分鐘
Intrusion Tolerance Literature15分鐘
Quiz4 個練習
Practice Quiz 2.2.1. Challenges in DDoS Defense8分鐘
Practice Quiz. 2.2.2. Unsupervised Anomaly-based Malware Detection Techniques16分鐘
Practice Quiz. 2.2.3 Intrusion Tolerance Autonomic Response Systems8分鐘
Quiz: DDoS Defenses 2.2.20分鐘
Week
3
Clock
完成時間為 3 小時

DDoS Defense Systems and Techniques

In this module, you learn an Autonomous Anti-DDoS Network called A2D2 suitable for small/medium size business to deal DDoS defense. A2D2 uses Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types. You learn how to analyze effectiveness of these different defense mechanisms. By the end of this course, you should be able to deploy firewall features to reduce the impact of DDoS on your system and develop strategies for dealing with future DDoS attacks. ...
Reading
2 個視頻(共 22 分鐘), 2 個閱讀材料, 3 個測驗
Video2 個視頻
Performance of CBQ/Rate Limit on DDoS Traffic7分鐘
Reading2 個閱讀材料
A2D2 Design and Implementation,分鐘
A2D2 DDoS Defense Experiments10分鐘
Quiz3 個練習
Practice Quiz. 2.3.120分鐘
Practice Quiz: 2.3.2 DDoS Impact Analysis12分鐘
Exam 2.3 DDoS Defense Systems and Techniques30分鐘
Week
4
Clock
完成時間為 3 小時

Intrusion Tolerance with Proxy-based Multipath Routing

In this module you learn a new Intrusion tolerance paradigm with proxy-based multipath routing for DDoS defense. You learn the development of such new security mechanism also improves the performance and reliability of the system, and does not have to be just an overhead....
Reading
2 個視頻(共 21 分鐘), 3 個閱讀材料, 3 個測驗
Video2 個視頻
SCOLD Features and Benefits7分鐘
Reading3 個閱讀材料
Intrusion Tolerant Architecture15分鐘
Intrusion-Tolerant Eclipse SCADA16分鐘
On proxy server based multipath connection5分鐘
Quiz3 個練習
Practice Quiz 2.4.1.16分鐘
Practice Quiz. 2.4.28分鐘
Quiz 2.4 Intrusion Tolerance30分鐘

講師

Edward Chow

Professor
Computer Science

關於 University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

常見問題

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

還有其他問題嗎?請訪問 學生幫助中心